Sign In
Not register? Register Now!
Pages:
2 pages/β‰ˆ550 words
Sources:
6 Sources
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Public-Key Cryptography

Essay Instructions:

Describe public-key cryptography and write a comparative analysis of its pros and cons. Provide a comparison of the pros and cons of solving security issues via technology. Discuss trends in information security technology and the impact they may have on society.
Use your own words. There are many sources on cryptography on the Internet. Do not cut and paste, but explain in your own words. Only in this way can you fully digest what you have learned. Write as if you are explaining the subject to your colleagues or co-workers.
When you discuss the trends in information security, use the suggested article as a reference. Your own opinions are always welcome. Please be clear, comprehensive, and in-depth.
References to use:
1. Ellison C. and Schneier B. (2000) Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure. Computer Security Journal, v 16, n 1, 2000, pp. 1-7. http://www(dot)schneier(dot)com/paper-pki.pdf.
2. Diffie, Whitfield. (2008) Information Security: 50 Years Behind, 50 Years Ahead. Communications of the ACM, 51(1), 55-57. 
3. Current activity report of the latest security incidents, US-CERT. Retrieved from http://www(dot)us-cert(dot)gov/ncas/current-activity
4. Computer Emergency Readiness Team Makes Progress in Securing Cyberspace, but Challenges Remain. (2010). Retrieved from http://www(dot)oig(dot)dhs(dot)gov/assets/Mgmt/OIG_10-94_Jun10.pdf
5. Wang, Wenli. PowerPoint presentation. Security via Cryptography.
6. Wang, Wenli. A simple writing on What is encryption and SSL?

Essay Sample Content Preview:

Public-Key Cryptography
Name
Institution
Date
Public-Key Cryptography
The internet has made information accessible to everyone who has a computer and network connection regardless of the existing geographical boundaries or time differences. Easily accessible information has come along with risks including a high risk of valuable information being lost, stolen, changed or misused. Using cryptography helps in protecting information, making it a standardized part of any infrastructure. However, this has not eliminated all the security threats, but to a greater extent, computer security has been improved since its establishment in 1960 (Whitfield, 2008). Cryptography is an important aspect of the current computer operations. This paper describes the importance of public-key cryptography, one of the advanced technologies used for security, comparing its advantages and disadvantages when solving security issues through technology.
Public-key cryptography is a technique used to protect information by encrypting it in a way that those with the key can decrypt the message into text. The technique uses public and private key to ensure data is secure. The sender uses the recipient’s public key to encrypt the message; to decrypt the message the recipient uses the private key. In the current world, the internet is becoming common, increasing the need for electronic security (Ellison & Schneier, 2000). Cryptography is one of the techniques used to protect email messages, credit card information and other important corporates’ and governments’ data (Ellison & Schneier, 2000).
Compared to the last 50 years, computer security using advanced technology has made great progress. Computer security in the 20th century, initiated networking systems that necessitated the role of cryptography (Wang, 2002). In 1970, the public-key cryptography came with major improvements as it eliminated most need to transport secret keys, as digital signatures were developed. This has improved key management with digital signatures. International businesses greatly improved especially at the beginning of 1990 (Wang, 2002). Solving security using technology helps identify potential threats and vulnerabilities. Security personnel are able to follow the trends of attack to determine the patterns of attack whether isolated or systematic. This helps in planning strategically by mitigating similar attacks in future .In addition a consolidated portal provides several classification platforms that serve as the central storage area, a central system ease coordination and also meet the needs of various stakeholders
However, using computer to solve security faces several challenges including computers being subjected to attacks by viruses and other unscrupulous programs making the system not safe ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!